Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

ServiceNow and CyberArk: New REST API integration for enhanced credential management

ServiceNow’s External Credential Storage and Management Application is designed to help organizations securely retrieve and manage credentials from external vaults during IT operations, like discovery and orchestration, without storing sensitive data in ServiceNow. This helps ensure compliance, reduces risk, and strengthens privileged access security across hybrid environments.

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact.

EP 24 - FOMO, identity, and the realities of AI at scale

In this episode of Security Matters, host David Puner sits down with Ariel Pisetzky, chief information officer at CyberArk, for a candid look at the fast‑evolving intersection of AI, cybersecurity, and IT innovation. As organizations race to adopt AI, the fear of missing out is driving rapid decisions—often without enough consideration for identity, security, or long‑term impact. Ariel shares practical insights on what it really takes to secure AI at scale, from combating AI‑enabled phishing attacks to managing agent identities and reducing growing risks in the software supply chain.

Are we trusting AI too much?

Gone are the days when attackers had to break down doors. Now, they just log in with what look like legitimate credentials. This shift in tactics has been underway for a while, but the rapid adoption of artificial intelligence is adding a new layer of complexity. AI is a powerful tool, but our growing reliance on it comes with a catch: it’s eroding our critical thinking skills.

Automating User Access Reviews: How IGA Delivers Real Business Value

Still managing user access reviews manually? You’re not alone — and it’s costing you. This teaser highlights how automated User Access Reviews (UARs can reduce effort, improve audit readiness, and deliver real business value. In the full webinar, CyberArk experts share real-world examples, ROI insights, and how automation can cut review effort by up to 80%. Watch the full webinar on our website to learn how automated IGA transforms access reviews from a burden into a business advantage.

The hidden cost of PKI: Why certificate failures aren't just an IT problem

For years, businesses have treated public key infrastructure (PKI) as background plumbing, quietly securing access across enterprise systems and devices, and rarely drawing executive attention unless something failed. New research from the Ponemon Institute suggests that those assumptions no longer hold.

CyberArk named overall leader in 2025 KuppingerCole ITDR Leadership Compass

KuppingerCole has recognized CyberArk identity threat detection and response (ITDR) as a leader across all categories: overall, product, innovation, and market in its 2025 KuppingerCole Leadership Compass for Identity Threat Detection & Response.

How the future of privilege is reshaping compliance

If privilege has changed, compliance can’t stay static. As organizations accelerate digital transformation, the compliance landscape is shifting beneath their feet—especially when it comes to how privileged access is controlled and proven. Regulatory requirements are multiplying, audit cycles are tightening, and the definition of privileged access has quietly expanded beyond people to workloads, automation, and AI-driven systems.

Elevating Access Reviews to Be a Business Enabler

Is your organization treating access reviews as a checkbox exercise — or a business enabler? In the full video, CyberArk’s Deepak Taneja explains why access reviews are becoming a critical pillar of identity security and zero trust — and how automation is reshaping their value across the business. Watch the full interview to learn why a compliance-only mindset creates risk, how organizations are modernizing access reviews, and what it takes to shift from audit task to strategic advantage.